{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:36:11Z","timestamp":1757540171995,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031562518"},{"type":"electronic","value":"9783031562525"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56252-5_4","type":"book-chapter","created":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T06:51:26Z","timestamp":1710831086000},"page":"69-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Insights into\u00a0SAV Implementations in\u00a0the\u00a0Internet"],"prefix":"10.1007","author":[{"given":"Haya","family":"Schulmann","sequence":"first","affiliation":[]},{"given":"Shujie","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,20]]},"reference":[{"key":"4_CR1","unstructured":"Domains Monitor. https:\/\/domains-monitor.com\/. Accessed 25 Jan 2023"},{"key":"4_CR2","unstructured":"Rapid7 labs. https:\/\/opendata.rapid7.com\/. Accessed 11 Dec 2022"},{"key":"4_CR3","unstructured":"Fraunhofer AICOS: TSFEL documentation release 0.1.4 (2021). https:\/\/tsfel.readthedocs.io\/_\/downloads\/en\/development\/pdf\/. Accessed 2 Nov 2021"},{"key":"4_CR4","unstructured":"Antirez: http:\/\/seclists.org\/bugtraq\/1998\/Dec\/0079.html. Accessed 16 Jan 2022"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Baker, F., Savola, P.: RFC 3704: ingress filtering for multihomed networks (2004)","DOI":"10.17487\/rfc3704"},{"key":"4_CR6","unstructured":"Beverly, R., Bauer, S.: The Spoofer project: inferring the extent of source address filtering on the internet. In: USENIX SRUTI, vol. 5, pp. 53\u201359 (2005)"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Braden, R.T.: Requirements for internet hosts - communication layers. RFC 1122, October 1989. https:\/\/doi.org\/10.17487\/RFC1122. https:\/\/rfc-editor.org\/rfc\/rfc1122.txt","DOI":"10.17487\/RFC1122"},{"key":"4_CR8","unstructured":"CAIDA: https:\/\/publicdata.caida.org\/datasets\/as-relationships\/serial-1\/. Accessed 10 Oct 2023"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Chandola, V., Vatsavai, R.R.: A Gaussian process based online change detection algorithm for monitoring periodic time series. In: Proceedings of the 2011 SIAM International Conference on Data Mining, pp. 95\u2013106. SIAM (2011)","DOI":"10.1137\/1.9781611972818.9"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Chauhan, S., Vig, L.: Anomaly detection in ECG time signals via deep long short-term memory networks. In: 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 1\u20137. IEEE (2015)","DOI":"10.1109\/DSAA.2015.7344872"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Dai, T., Shulman, H.: SMap: internet-wide scanning for spoofing. In: Annual Computer Security Applications Conference, pp. 1039\u20131050 (2021)","DOI":"10.1145\/3485832.3485917"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Deccio, C., Hilton, A., Briggs, M., Avery, T., Richardson, R.: Behind closed doors: a network tale of spoofing, intrusion, and false DNS security. In: Proceedings of the ACM Internet Measurement Conference, pp. 65\u201377 (2020)","DOI":"10.1145\/3419394.3423649"},{"key":"4_CR13","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: USENIX Security Symposium, vol. 8, pp. 47\u201353 (2013)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-04918-2_11","volume-title":"Passive and Active Measurement","author":"R Ensafi","year":"2014","unstructured":"Ensafi, R., Knockel, J., Alexander, G., Crandall, J.R.: Detecting intentional packet drops on the internet via TCP\/IP side channels. In: Faloutsos, M., Kuzmanovic, A. (eds.) PAM 2014. LNCS, vol. 8362, pp. 109\u2013118. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-04918-2_11"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Guo, T., Xu, Z., Yao, X., Chen, H., Aberer, K., Funaya, K.: Robust online time series prediction with recurrent neural networks. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 816\u2013825. IEEE (2016)","DOI":"10.1109\/DSAA.2016.92"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-030-44081-7_7","volume-title":"Passive and Active Measurement","author":"M Korczy\u0144ski","year":"2020","unstructured":"Korczy\u0144ski, M., Nosyk, Y., Lone, Q., Skwarek, M., Jonglez, B., Duda, A.: Don\u2019t forget to lock the front door! Inferring the deployment of source address validation of inbound traffic. In: Sperotto, A., Dainotti, A., Stiller, B. (eds.) PAM 2020. LNCS, vol. 12048, pp. 107\u2013121. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44081-7_7"},{"key":"4_CR17","unstructured":"K\u00fchrer, M., Hupperich, T., Rossow, C., Holz, T.: Exit from hell? Reducing the impact of Amplification DDoS attacks. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 111\u2013125 (2014)"},{"issue":"3","key":"4_CR18","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TIFS.2013.2296437","volume":"9","author":"B Liu","year":"2014","unstructured":"Liu, B., Bi, J., Vasilakos, A.V.: Toward incentivizing anti-spoofing deployment. IEEE Trans. Inf. Forensics Secur. 9(3), 436\u2013450 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Lone, Q., Frik, A., Luckie, M., Korczy\u0144ski, M., van Eeten, M., Gan\u00e1n, C.: Deployment of source address validation by network operators: a randomized control trial. In: Proceedings of the IEEE Security and Privacy (S&P) (2022)","DOI":"10.1109\/SP46214.2022.9833701"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Lone, Q., Luckie, M., Korczy\u0144ski, M., Asghari, H., Javed, M., Van Eeten, M.: Using crowdsourcing marketplaces for network measurements: the case of Spoofer. In: 2018 Network Traffic Measurement and Analysis Conference (TMA), pp. 1\u20138. IEEE (2018)","DOI":"10.23919\/TMA.2018.8506499"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-319-54328-4_17","volume-title":"Passive and Active Measurement","author":"Q Lone","year":"2017","unstructured":"Lone, Q., Luckie, M., Korczy\u0144ski, M., van Eeten, M.: Using loops observed in traceroute to infer the ability to Spoof. In: Kaafar, M.A., Uhlig, S., Amann, J. (eds.) PAM 2017. LNCS, vol. 10176, pp. 229\u2013241. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54328-4_17"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Luckie, M., Beverly, R., Koga, R., Keys, K., Kroll, J.A., Claffy, K.: Network hygiene, incentives, and regulation: deployment of source address validation in the internet. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 465\u2013480 (2019)","DOI":"10.1145\/3319535.3354232"},{"key":"4_CR23","unstructured":"MANRS: Anti-Spoofing - Preventing traffic with spoofed source IP addresses. https:\/\/www.manrs.org\/netops\/guide\/antispoofing\/. Accessed 25 Jan 2023"},{"key":"4_CR24","unstructured":"Mauch, J.: Spoofing ASNs. https:\/\/seclists.org\/nanog\/2013\/Aug\/132. Accessed 25 Jan 2023"},{"issue":"3","key":"4_CR25","first-page":"69","volume":"24","author":"MM Mukaka","year":"2012","unstructured":"Mukaka, M.M.: A guide to appropriate use of correlation coefficient in medical research. Malawi Med. J. 24(3), 69\u201371 (2012)","journal-title":"Malawi Med. J."},{"key":"4_CR26","unstructured":"NMAP: TCP Idle Scan. https:\/\/nmap.org\/book\/idlescan.html. Accessed 10 Nov 2022"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-030-00434-7_4","volume-title":"Cryptology and Network Security","author":"L Orevi","year":"2018","unstructured":"Orevi, L., Herzberg, A., Zlatokrilov, H.: DNS-DNS: DNS-based De-NAT scheme. In: Camenisch, J., Papadimitratos, P. (eds.) CANS 2018. LNCS, vol. 11124, pp. 69\u201388. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00434-7_4"},{"issue":"10","key":"4_CR28","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/2896816","volume":"59","author":"C Partridge","year":"2016","unstructured":"Partridge, C., Allman, M.: Ethical considerations in network measurement papers. Commun. ACM 59(10), 58\u201364 (2016)","journal-title":"Commun. ACM"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Pearce, P., Ensafi, R., Li, F., Feamster, N., Paxson, V.: Augur: internet-wide detection of connectivity disruptions. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 427\u2013443. IEEE (2017)","DOI":"10.1109\/SP.2017.55"},{"key":"4_CR30","unstructured":"Postel, J.: Internet protocol. RFC 791, RFC Editor, September 1981. https:\/\/www.rfc-editor.org\/info\/rfc791"},{"key":"4_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-76481-8_18","volume-title":"Passive and Active Measurement","author":"F Salutari","year":"2018","unstructured":"Salutari, F., Cicalese, D., Rossi, D.J.: A closer look at IP-ID behavior in the wild. In: Beverly, R., Smaragdakis, G., Feldmann, A. (eds.) PAM 2018. LNCS, vol. 10771, pp. 243\u2013254. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-76481-8_18"},{"key":"4_CR32","doi-asserted-by":"publisher","unstructured":"Semmlow, J.: The Fourier transform and power spectrum: implications and applications. In: Semmlow, J. (ed.) Signals and Systems for Bioengineers, 2nd edn., pp. 131\u2013165. Biomedical Engineering, Academic Press, Boston (2012). https:\/\/doi.org\/10.1016\/B978-0-12-384982-3.00004-3. https:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780123849823000043","DOI":"10.1016\/B978-0-12-384982-3.00004-3"},{"key":"4_CR33","doi-asserted-by":"publisher","unstructured":"Senie, D., Ferguson, P.: Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2827, May 2000. https:\/\/doi.org\/10.17487\/RFC2827. https:\/\/www.rfc-editor.org\/info\/rfc2827","DOI":"10.17487\/RFC2827"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Sriram, K., Montgomery, D., Haas, J.: RFC 8704 enhanced feasible-path unicast reverse path forwarding (2020)","DOI":"10.17487\/RFC8704"},{"key":"4_CR35","doi-asserted-by":"publisher","unstructured":"Touch, D.J.D.: Updated Specification of the IPv4 ID Field. RFC 6864, February 2013. https:\/\/doi.org\/10.17487\/RFC6864. https:\/\/rfc-editor.org\/rfc\/rfc6864.txt","DOI":"10.17487\/RFC6864"},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, X., Knockel, J., Crandall, J.R.: ONIS: inferring TCP\/IP-based trust relationships completely off-path. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 2069\u20132077. IEEE (2018)","DOI":"10.1109\/INFOCOM.2018.8486426"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56252-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T06:58:36Z","timestamp":1710831516000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56252-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031562518","9783031562525"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56252-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"20 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pam2024.cs.northwestern.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.42","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}